Posts tagged "Sileo"

Top Tips for Tax-time Identity Theft Prevention: Part 2

image-11751

Tax Time Identity Theft: Part 1 – Tax Preparers | Part 2 – Protecting Computers | Part 3 – IRS & Tax Scams

Secure your computers and copy machines from hackers.

Last year, more than 80 million Americans filed their tax returns electronically and even more stored tax-related information insecurely on their computers. To prevent electronic identity theft, implement the following security measures:

  • Install anti-virus, anti-spam and anti-spyware software (generally referred to as a Security Suite) configured to download and install automatic updates. Failure to take this most basic and time-tested of steps allows malware attached to malicious emails, social media platforms and rogue websites to penetrate your entire system, giving thieves access to every computer on your network, not just one.
  • Create strong alphanumeric passwords or utilize password protection software to protect the digital keys to your information.
  • Encrypt hard drives or data-sensitive folders to keep out unwanted visitors.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , ,

How to Stop Email Account Hackers (Fox & Friends)

Posted in Burning Questions (Video), Cyber Data Security, Identity Theft Prevention, Online Privacy, Video Tips by Identity Theft Speaker .
Tags: , , , , , , , , , , ,

Instagram vs consumers: Who really won?

Previously, we discussed the whole Instagram debacle over the changes made to its terms and conditions. When company founder Kevin Systrom announced via blog post that he listened to the feedback from users and reverted a section dealing with advertising back to its original version, many thought they had won a solid victory. But did they?

Nilay Patel argues in a recent article for The Verge that this may not be the case, and his reasoning is sound.

"That certainly sounds like a win for consumers, but it's actually a loss: the newly reinstated terms of service clause is objectively worse for users than the new one, and it's worded far more vaguely – the language feels familiar and comforting, but you're giving up more rights to your photos," Patel writes.

As he points out, while the new language allowed Instagram to display photos in connection with advertising, the original terms let the company place advertising "on, about, or in conjunction with" user photos.

Posted in Online Privacy by Identity Theft Speaker .
Tags: , , , ,

U.S. expands online child privacy laws, but glaring loopholes remain

Federal regulators have recently made some progress with regard to protecting the privacy of minors online by adding language specific to applications and social networks – to a certain extent. However, perhaps the amendments made to the Children's Online Privacy Act (COPPA) of 1998 should not be seen as a sweeping victory for parents everywhere, but as an indication of how much farther we still have to go.

For starters, the new rules, which don't go into effect until July of 2013, only apply to children under the age of 13. This is likely of little consolation to the parents of a 15-year-old boy or girl growing up in a world where their entire lives are being documented on the internet.

Furthermore, while the new regulations handed down by the Federal Trade Commission will require websites and applications geared toward children to obtain permission from parents before gathering data on their kids, it does not hold app stores accountable.

Posted in Online Privacy by Identity Theft Speaker .
Tags: , , , , , , ,

Online privacy lessons from the recent Instagram debacle

Whenever you buy a car or a house, there's always fine print – tiny lettering that people rarely read but causes many a headache. After all, the devil is in the details.

It's the buyers' responsibility to read the fine print and the terms and conditions, and make sure they are not being taken advantage of. It's okay to ask for help if the language is confusing. Most legal documents and service agreements use phrasing that would tie the average person's tongue in knots. So, seeking advice is actually … well, advisable.

The same applies to users of social media platforms. Take a look at the recent debacle with Instagram. The company that developed the popular photo-sharing service purchased by Facebook earlier this year – for a paltry $1 billion – recently rolled out a revised set of terms and conditions. The wording was so confusing that many legal experts cited by the tech media had difficulty sifting through it all, let alone the average user.

Posted in Online Privacy by Identity Theft Speaker .
Tags: , , , ,

9th Day: I’m Getting Nuttin’ (but Scams) for Christmas

image-6043

Holiday Security Tips: On the ninth day of Christmas, the experts gave to me, 9 protected packages

Thieves are on the lookout for the delivery of packages, especially around the holidays.  Fed Ex and UPS packages might sit outside for hours, often in plain view from the street, making a mighty tempting target.  Not only can thieves grab the precious contents inside, but also the shipping labels often contain personal information the thieves love to get their hands on.

Solution: Ship packages to your work address, a PO Box or require a signature 

If your employer doesn’t mind your receiving packages at work, have them shipped there since someone is generally available during the day (when shipments arrive). If that doesn’t work, consider getting a PO Box at the post office during the holidays. When all else fails, ask to have your packages shipped with signature required so that they aren’t dropped off unless someone is there to sign.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , ,

Protect Your Packages this Holiday Season!

Almost 20 billion packages will be delivered through the mail this holiday season. Even at $5 per package, that’s more than $100 Billion in value going through the mail–a scale too large and tempting for criminals to ignore.

Why do thieves target us during the holidays? In addition to the volume and value of holiday mail, criminals are taking advantage of the perfect winter storm:

  • Trucks are overloaded, mail & UPS carriers are overworked and shoppers are overwhelmed, which makes theft easy and attractive
  • Thieves take advantage not just of our good nature during the holidays, but of how distracted we are
  • Criminals see our generosity of giving as a goldmine waiting to be exploited

Posted in Cyber Data Security, Identity Theft Prevention, Sileo In the News by Identity Theft Speaker .
Tags: , , , , , , , , , , , , ,

Cyber Monday Cyber Security in 60 Seconds

Cyber Thieves are officially out today to steal your credit card information or any other private personal information they can intercept as you shop online during Cyber Monday (and for the rest of the holiday season). In less that 60 seconds, you can know what they are up to and what to watch out for. Only 50 seconds left, so here they are (note: some of the “for more info” links will only become live over the next few weeks in our 12 Days of Christmas series, so please check back):

  1. Be extremely careful when using free Wi-Fi hotspots to shop online, as you are being watched by data sniffers.
  2. Only shop on secure, reputable websites that: A. You know via other means (the press; you shop at their store) B. Look for “https” in the URL, C. The website has a small padlock icon in the bottom right corner of your browser or the URL turns green, signaling a “safe” site.

Posted in Cyber Data Security, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , ,

3.8 Million South Carolina Taxpayers at Risk for ID Theft

South Carolina Governor Nikki Haley blamed an outdated Internal Revenue Service standard (see below) as a source of a massive data breach that exposed the SSNs of 3.8 million South Carolina taxpayers plus credit card and bank account data. The identity information, nearly 75 GB worth, was stolen from computers that belonged to the SC Department of Revenue.

The breach reveals some shocking realizations for the people of South Carolina, and the rest of us:

  • South Carolina is compliant with IRS rules, but the IRS DOES NOT REQUIRE THAT SSNs BE ENCRYPTED. In other words, the keys to your financial buying power (your credit profile via SSN) is protected in no material way by the IRS, and therefore by your state government.
  • Technology isn’t the only source of blame. As is the case in nearly every data breach I’m brought in to help clean up, a HUMAN DECISION is at the heart of the breach.

Posted in Cyber Data Security, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , ,